Analysis
-
max time kernel
50s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 01:48
Behavioral task
behavioral1
Sample
0aa02cff16574f262342cf5a3e143036.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
0aa02cff16574f262342cf5a3e143036.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
0aa02cff16574f262342cf5a3e143036.exe
-
Size
30KB
-
MD5
0aa02cff16574f262342cf5a3e143036
-
SHA1
d8a67e8f4ba941070e8cff57cc2b8672507f44a8
-
SHA256
3f1f90f6ea3ed40e328fd7ade4f5ce4c77aaba86668d405232f7a69e3957fd3f
-
SHA512
8029a3ff06b94f97bf1321741454d0c40a34fdf31a07a56861e18ddb937b47db2f300bd488f370f36ff9a76fff4768d1165b3aa7c08997aa345cc0af044ea32f
-
SSDEEP
768:vkJ7yLt93SI9uooH5gZ+lsOMxUBbTh+N8AWtuB:vkJStg9By8OO/xU1WA
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 5076 SysTrày.exe 2132 SysTrày.exe 2036 SysTrày.exe 224 SysTrày.exe 1188 SysTrày.exe 1640 SysTrày.exe 3776 SysTrày.exe 2784 SysTrày.exe 1616 SysTrày.exe 4572 SysTrày.exe 3472 SysTrày.exe 928 SysTrày.exe 724 SysTrày.exe 2088 SysTrày.exe 432 SysTrày.exe 2540 SysTrày.exe 4276 SysTrày.exe 4772 SysTrày.exe 3020 SysTrày.exe 4748 SysTrày.exe 5048 SysTrày.exe 4432 SysTrày.exe 3288 SysTrày.exe 2648 SysTrày.exe 4864 SysTrày.exe 4968 SysTrày.exe 3564 SysTrày.exe 4612 SysTrày.exe 5020 SysTrày.exe 4624 SysTrày.exe 2120 SysTrày.exe 2448 SysTrày.exe 2300 SysTrày.exe 2220 SysTrày.exe 4476 SysTrày.exe 3800 SysTrày.exe 1732 SysTrày.exe 2092 SysTrày.exe 228 SysTrày.exe 2588 SysTrày.exe 4656 SysTrày.exe 4604 SysTrày.exe 3224 SysTrày.exe 4060 SysTrày.exe 640 SysTrày.exe 2224 SysTrày.exe 3728 SysTrày.exe 1828 SysTrày.exe 2156 SysTrày.exe 32 SysTrày.exe 656 SysTrày.exe 1596 SysTrày.exe 4372 SysTrày.exe 2492 SysTrày.exe 1332 SysTrày.exe 5056 SysTrày.exe 3584 SysTrày.exe 4924 SysTrày.exe 4804 SysTrày.exe 1932 SysTrày.exe 4868 SysTrày.exe 980 SysTrày.exe 1780 SysTrày.exe 1784 SysTrày.exe -
resource yara_rule behavioral2/memory/736-0-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/files/0x000200000001e7c9-3.dat upx behavioral2/memory/736-6-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2132-7-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/5076-17-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3472-18-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2132-20-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2036-22-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/224-24-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2088-25-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1188-27-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/432-28-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2540-31-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1640-30-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3776-33-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4276-34-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2784-36-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1616-38-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3020-39-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4572-41-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3472-43-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4432-46-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/928-45-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/724-48-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2088-50-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/432-52-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4864-53-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2540-55-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4276-57-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3564-58-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4772-60-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3020-62-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4748-64-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/5048-66-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4432-68-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3288-70-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2648-72-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2220-73-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4864-75-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4968-77-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3564-79-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4612-81-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2092-82-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/5020-84-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4624-86-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2588-87-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2120-89-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2448-91-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4604-92-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2300-94-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2220-96-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4476-98-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3800-100-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2224-101-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1732-103-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2092-105-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/1828-106-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/228-108-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2588-110-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/32-111-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4656-113-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/4604-115-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/3224-117-0x0000000000400000-0x0000000000418000-memory.dmp upx behavioral2/memory/2492-120-0x0000000000400000-0x0000000000418000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" 0aa02cff16574f262342cf5a3e143036.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray = "SysTrày.exe" SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SystemTray SysTrày.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe File created C:\Windows\SysWOW64\SysTrày.exe SysTrày.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 1148 736 0aa02cff16574f262342cf5a3e143036.exe 92 PID 736 wrote to memory of 1148 736 0aa02cff16574f262342cf5a3e143036.exe 92 PID 736 wrote to memory of 1148 736 0aa02cff16574f262342cf5a3e143036.exe 92 PID 736 wrote to memory of 5076 736 0aa02cff16574f262342cf5a3e143036.exe 93 PID 736 wrote to memory of 5076 736 0aa02cff16574f262342cf5a3e143036.exe 93 PID 736 wrote to memory of 5076 736 0aa02cff16574f262342cf5a3e143036.exe 93 PID 5076 wrote to memory of 1152 5076 SysTrày.exe 94 PID 5076 wrote to memory of 1152 5076 SysTrày.exe 94 PID 5076 wrote to memory of 1152 5076 SysTrày.exe 94 PID 5076 wrote to memory of 2132 5076 SysTrày.exe 95 PID 5076 wrote to memory of 2132 5076 SysTrày.exe 95 PID 5076 wrote to memory of 2132 5076 SysTrày.exe 95 PID 2132 wrote to memory of 1536 2132 SysTrày.exe 96 PID 2132 wrote to memory of 1536 2132 SysTrày.exe 96 PID 2132 wrote to memory of 1536 2132 SysTrày.exe 96 PID 2132 wrote to memory of 2036 2132 SysTrày.exe 97 PID 2132 wrote to memory of 2036 2132 SysTrày.exe 97 PID 2132 wrote to memory of 2036 2132 SysTrày.exe 97 PID 2036 wrote to memory of 456 2036 SysTrày.exe 98 PID 2036 wrote to memory of 456 2036 SysTrày.exe 98 PID 2036 wrote to memory of 456 2036 SysTrày.exe 98 PID 2036 wrote to memory of 224 2036 SysTrày.exe 99 PID 2036 wrote to memory of 224 2036 SysTrày.exe 99 PID 2036 wrote to memory of 224 2036 SysTrày.exe 99 PID 224 wrote to memory of 4848 224 SysTrày.exe 100 PID 224 wrote to memory of 4848 224 SysTrày.exe 100 PID 224 wrote to memory of 4848 224 SysTrày.exe 100 PID 224 wrote to memory of 1188 224 SysTrày.exe 101 PID 224 wrote to memory of 1188 224 SysTrày.exe 101 PID 224 wrote to memory of 1188 224 SysTrày.exe 101 PID 1188 wrote to memory of 4924 1188 SysTrày.exe 102 PID 1188 wrote to memory of 4924 1188 SysTrày.exe 102 PID 1188 wrote to memory of 4924 1188 SysTrày.exe 102 PID 1188 wrote to memory of 1640 1188 SysTrày.exe 103 PID 1188 wrote to memory of 1640 1188 SysTrày.exe 103 PID 1188 wrote to memory of 1640 1188 SysTrày.exe 103 PID 1640 wrote to memory of 2300 1640 SysTrày.exe 104 PID 1640 wrote to memory of 2300 1640 SysTrày.exe 104 PID 1640 wrote to memory of 2300 1640 SysTrày.exe 104 PID 1640 wrote to memory of 3776 1640 SysTrày.exe 105 PID 1640 wrote to memory of 3776 1640 SysTrày.exe 105 PID 1640 wrote to memory of 3776 1640 SysTrày.exe 105 PID 3776 wrote to memory of 4812 3776 SysTrày.exe 106 PID 3776 wrote to memory of 4812 3776 SysTrày.exe 106 PID 3776 wrote to memory of 4812 3776 SysTrày.exe 106 PID 3776 wrote to memory of 2784 3776 SysTrày.exe 107 PID 3776 wrote to memory of 2784 3776 SysTrày.exe 107 PID 3776 wrote to memory of 2784 3776 SysTrày.exe 107 PID 2784 wrote to memory of 4628 2784 SysTrày.exe 108 PID 2784 wrote to memory of 4628 2784 SysTrày.exe 108 PID 2784 wrote to memory of 4628 2784 SysTrày.exe 108 PID 2784 wrote to memory of 1616 2784 SysTrày.exe 109 PID 2784 wrote to memory of 1616 2784 SysTrày.exe 109 PID 2784 wrote to memory of 1616 2784 SysTrày.exe 109 PID 1616 wrote to memory of 4804 1616 SysTrày.exe 110 PID 1616 wrote to memory of 4804 1616 SysTrày.exe 110 PID 1616 wrote to memory of 4804 1616 SysTrày.exe 110 PID 1616 wrote to memory of 4572 1616 SysTrày.exe 111 PID 1616 wrote to memory of 4572 1616 SysTrày.exe 111 PID 1616 wrote to memory of 4572 1616 SysTrày.exe 111 PID 4572 wrote to memory of 1764 4572 SysTrày.exe 112 PID 4572 wrote to memory of 1764 4572 SysTrày.exe 112 PID 4572 wrote to memory of 1764 4572 SysTrày.exe 112 PID 4572 wrote to memory of 3472 4572 SysTrày.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aa02cff16574f262342cf5a3e143036.exe"C:\Users\Admin\AppData\Local\Temp\0aa02cff16574f262342cf5a3e143036.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\Systray.exeSystray.exe2⤵PID:1148
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\Systray.exeSystray.exe3⤵PID:1152
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\Systray.exeSystray.exe4⤵PID:1536
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\Systray.exeSystray.exe5⤵PID:456
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\Systray.exeSystray.exe6⤵PID:4848
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Systray.exeSystray.exe7⤵PID:4924
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Systray.exeSystray.exe8⤵PID:2300
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\Systray.exeSystray.exe9⤵PID:4812
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\Systray.exeSystray.exe10⤵PID:4628
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\Systray.exeSystray.exe11⤵PID:4804
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\Systray.exeSystray.exe12⤵PID:1764
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe12⤵
- Executes dropped EXE
PID:3472 -
C:\Windows\SysWOW64\Systray.exeSystray.exe13⤵PID:3464
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe13⤵
- Executes dropped EXE
PID:928 -
C:\Windows\SysWOW64\Systray.exeSystray.exe14⤵PID:1632
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe14⤵
- Executes dropped EXE
PID:724 -
C:\Windows\SysWOW64\Systray.exeSystray.exe15⤵PID:4980
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe15⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\SysWOW64\Systray.exeSystray.exe16⤵PID:2460
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe16⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\Systray.exeSystray.exe17⤵PID:2452
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe17⤵
- Executes dropped EXE
PID:2540 -
C:\Windows\SysWOW64\Systray.exeSystray.exe18⤵PID:4128
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4276 -
C:\Windows\SysWOW64\Systray.exeSystray.exe19⤵PID:1748
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe19⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4772 -
C:\Windows\SysWOW64\Systray.exeSystray.exe20⤵PID:1924
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe20⤵
- Executes dropped EXE
PID:3020 -
C:\Windows\SysWOW64\Systray.exeSystray.exe21⤵PID:2992
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe21⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\Systray.exeSystray.exe22⤵PID:2616
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe22⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\SysWOW64\Systray.exeSystray.exe23⤵PID:1324
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe23⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\Systray.exeSystray.exe24⤵PID:4868
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe24⤵
- Executes dropped EXE
PID:3288 -
C:\Windows\SysWOW64\Systray.exeSystray.exe25⤵PID:4908
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe25⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2648 -
C:\Windows\SysWOW64\Systray.exeSystray.exe26⤵PID:2408
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe26⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\SysWOW64\Systray.exeSystray.exe27⤵PID:5000
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\Systray.exeSystray.exe28⤵PID:564
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe28⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\SysWOW64\Systray.exeSystray.exe29⤵PID:4800
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe29⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4612 -
C:\Windows\SysWOW64\Systray.exeSystray.exe30⤵PID:2184
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe30⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5020 -
C:\Windows\SysWOW64\Systray.exeSystray.exe31⤵PID:3728
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe31⤵
- Executes dropped EXE
PID:4624 -
C:\Windows\SysWOW64\Systray.exeSystray.exe32⤵PID:1152
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe32⤵
- Executes dropped EXE
PID:2120 -
C:\Windows\SysWOW64\Systray.exeSystray.exe33⤵PID:3568
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe33⤵
- Executes dropped EXE
PID:2448 -
C:\Windows\SysWOW64\Systray.exeSystray.exe34⤵PID:4924
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe34⤵
- Executes dropped EXE
PID:2300 -
C:\Windows\SysWOW64\Systray.exeSystray.exe35⤵PID:1972
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe35⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe36⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\SysWOW64\Systray.exeSystray.exe37⤵PID:4876
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe37⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\Systray.exeSystray.exe38⤵PID:4344
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe38⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\Systray.exeSystray.exe39⤵PID:2392
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\Systray.exeSystray.exe40⤵PID:3748
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:228 -
C:\Windows\SysWOW64\Systray.exeSystray.exe41⤵PID:4568
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe41⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\Systray.exeSystray.exe42⤵PID:1924
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe42⤵
- Executes dropped EXE
PID:4656 -
C:\Windows\SysWOW64\Systray.exeSystray.exe43⤵PID:1456
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe43⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\SysWOW64\Systray.exeSystray.exe44⤵PID:1332
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe44⤵
- Executes dropped EXE
PID:3224 -
C:\Windows\SysWOW64\Systray.exeSystray.exe45⤵PID:4492
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4060 -
C:\Windows\SysWOW64\Systray.exeSystray.exe46⤵PID:5000
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe46⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\Systray.exeSystray.exe47⤵PID:1848
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe47⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2224 -
C:\Windows\SysWOW64\Systray.exeSystray.exe48⤵PID:4072
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe48⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3728 -
C:\Windows\SysWOW64\Systray.exeSystray.exe49⤵PID:1976
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1828 -
C:\Windows\SysWOW64\Systray.exeSystray.exe50⤵PID:1548
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe50⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\SysWOW64\Systray.exeSystray.exe51⤵PID:4804
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:32 -
C:\Windows\SysWOW64\Systray.exeSystray.exe52⤵PID:4876
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe52⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:656 -
C:\Windows\SysWOW64\Systray.exeSystray.exe53⤵PID:884
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1596 -
C:\Windows\SysWOW64\Systray.exeSystray.exe54⤵PID:1488
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4372 -
C:\Windows\SysWOW64\Systray.exeSystray.exe55⤵PID:3376
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2492 -
C:\Windows\SysWOW64\Systray.exeSystray.exe56⤵PID:1324
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe56⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\SysWOW64\Systray.exeSystray.exe57⤵PID:4280
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe57⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5056 -
C:\Windows\SysWOW64\Systray.exeSystray.exe58⤵PID:4408
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe58⤵
- Executes dropped EXE
PID:3584 -
C:\Windows\SysWOW64\Systray.exeSystray.exe59⤵PID:456
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe59⤵
- Executes dropped EXE
PID:4924 -
C:\Windows\SysWOW64\Systray.exeSystray.exe60⤵PID:2528
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe60⤵
- Executes dropped EXE
PID:4804 -
C:\Windows\SysWOW64\Systray.exeSystray.exe61⤵PID:4980
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe61⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\Systray.exeSystray.exe62⤵PID:5036
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4868 -
C:\Windows\SysWOW64\Systray.exeSystray.exe63⤵PID:1848
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe63⤵
- Executes dropped EXE
- Adds Run key to start application
PID:980 -
C:\Windows\SysWOW64\Systray.exeSystray.exe64⤵PID:1764
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe64⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1780 -
C:\Windows\SysWOW64\Systray.exeSystray.exe65⤵PID:1428
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe65⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\Systray.exeSystray.exe66⤵PID:2144
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe66⤵PID:4848
-
C:\Windows\SysWOW64\Systray.exeSystray.exe67⤵PID:1764
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe67⤵PID:1428
-
C:\Windows\SysWOW64\Systray.exeSystray.exe68⤵PID:2144
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe68⤵PID:4568
-
C:\Windows\SysWOW64\Systray.exeSystray.exe69⤵PID:3324
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe69⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2144 -
C:\Windows\SysWOW64\Systray.exeSystray.exe70⤵PID:3324
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe70⤵PID:5132
-
C:\Windows\SysWOW64\Systray.exeSystray.exe71⤵PID:5156
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe71⤵
- Drops file in System32 directory
PID:5172 -
C:\Windows\SysWOW64\Systray.exeSystray.exe72⤵PID:5188
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe72⤵
- Drops file in System32 directory
PID:5212 -
C:\Windows\SysWOW64\Systray.exeSystray.exe73⤵PID:5232
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe73⤵PID:5244
-
C:\Windows\SysWOW64\Systray.exeSystray.exe74⤵PID:5264
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe74⤵
- Drops file in System32 directory
PID:5280 -
C:\Windows\SysWOW64\Systray.exeSystray.exe75⤵PID:5300
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe75⤵
- Drops file in System32 directory
PID:5312 -
C:\Windows\SysWOW64\Systray.exeSystray.exe76⤵PID:5332
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe76⤵PID:5348
-
C:\Windows\SysWOW64\Systray.exeSystray.exe77⤵PID:5368
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe77⤵
- Adds Run key to start application
PID:5384 -
C:\Windows\SysWOW64\Systray.exeSystray.exe78⤵PID:5404
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe78⤵
- Adds Run key to start application
PID:5420 -
C:\Windows\SysWOW64\Systray.exeSystray.exe79⤵PID:5440
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe79⤵
- Drops file in System32 directory
PID:5456 -
C:\Windows\SysWOW64\Systray.exeSystray.exe80⤵PID:5472
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe80⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:5496 -
C:\Windows\SysWOW64\Systray.exeSystray.exe81⤵PID:5520
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe81⤵
- Drops file in System32 directory
PID:5540 -
C:\Windows\SysWOW64\Systray.exeSystray.exe82⤵PID:5560
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe82⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:5576 -
C:\Windows\SysWOW64\Systray.exeSystray.exe83⤵PID:5600
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe83⤵
- Drops file in System32 directory
PID:5616 -
C:\Windows\SysWOW64\Systray.exeSystray.exe84⤵PID:5636
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe84⤵PID:5652
-
C:\Windows\SysWOW64\Systray.exeSystray.exe85⤵PID:5672
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe85⤵PID:5688
-
C:\Windows\SysWOW64\Systray.exeSystray.exe86⤵PID:5712
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe86⤵
- Adds Run key to start application
PID:5728 -
C:\Windows\SysWOW64\Systray.exeSystray.exe87⤵PID:5748
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe87⤵
- Adds Run key to start application
PID:5768 -
C:\Windows\SysWOW64\Systray.exeSystray.exe88⤵PID:5784
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe88⤵
- Adds Run key to start application
PID:5808 -
C:\Windows\SysWOW64\Systray.exeSystray.exe89⤵PID:5828
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe89⤵
- Drops file in System32 directory
PID:5844 -
C:\Windows\SysWOW64\Systray.exeSystray.exe90⤵PID:5864
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe90⤵
- Adds Run key to start application
PID:5880 -
C:\Windows\SysWOW64\Systray.exeSystray.exe91⤵PID:5900
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe91⤵
- Adds Run key to start application
PID:5916 -
C:\Windows\SysWOW64\Systray.exeSystray.exe92⤵PID:5936
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe92⤵PID:5952
-
C:\Windows\SysWOW64\Systray.exeSystray.exe93⤵PID:5968
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe93⤵
- Adds Run key to start application
PID:5996 -
C:\Windows\SysWOW64\Systray.exeSystray.exe94⤵PID:6020
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe94⤵
- Adds Run key to start application
PID:6036 -
C:\Windows\SysWOW64\Systray.exeSystray.exe95⤵PID:6056
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe95⤵
- Drops file in System32 directory
PID:6072 -
C:\Windows\SysWOW64\Systray.exeSystray.exe96⤵PID:6088
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe96⤵
- Adds Run key to start application
PID:6112 -
C:\Windows\SysWOW64\Systray.exeSystray.exe97⤵PID:6128
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe97⤵
- Drops file in System32 directory
PID:5128 -
C:\Windows\SysWOW64\Systray.exeSystray.exe98⤵PID:5164
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe98⤵PID:5200
-
C:\Windows\SysWOW64\Systray.exeSystray.exe99⤵PID:5236
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe99⤵
- Adds Run key to start application
PID:5268 -
C:\Windows\SysWOW64\Systray.exeSystray.exe100⤵PID:5288
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe100⤵PID:4992
-
C:\Windows\SysWOW64\Systray.exeSystray.exe101⤵PID:484
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe101⤵PID:3928
-
C:\Windows\SysWOW64\Systray.exeSystray.exe102⤵PID:3608
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe102⤵
- Drops file in System32 directory
PID:5344 -
C:\Windows\SysWOW64\Systray.exeSystray.exe103⤵PID:5356
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe103⤵PID:5400
-
C:\Windows\SysWOW64\Systray.exeSystray.exe104⤵PID:5432
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe104⤵
- Drops file in System32 directory
PID:5464 -
C:\Windows\SysWOW64\Systray.exeSystray.exe105⤵PID:5492
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe105⤵PID:5528
-
C:\Windows\SysWOW64\Systray.exeSystray.exe106⤵PID:5568
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe106⤵PID:5608
-
C:\Windows\SysWOW64\Systray.exeSystray.exe107⤵PID:5648
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe107⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:5696 -
C:\Windows\SysWOW64\Systray.exeSystray.exe108⤵PID:5736
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe108⤵
- Drops file in System32 directory
PID:5776 -
C:\Windows\SysWOW64\Systray.exeSystray.exe109⤵PID:5832
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe109⤵PID:5868
-
C:\Windows\SysWOW64\Systray.exeSystray.exe110⤵PID:5888
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe110⤵PID:5584
-
C:\Windows\SysWOW64\Systray.exeSystray.exe111⤵PID:5944
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe111⤵PID:5968
-
C:\Windows\SysWOW64\Systray.exeSystray.exe112⤵PID:6020
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe112⤵PID:6068
-
C:\Windows\SysWOW64\Systray.exeSystray.exe113⤵PID:6092
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe113⤵PID:6132
-
C:\Windows\SysWOW64\Systray.exeSystray.exe114⤵PID:5168
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe114⤵
- Drops file in System32 directory
PID:5232 -
C:\Windows\SysWOW64\Systray.exeSystray.exe115⤵PID:2896
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe115⤵
- Adds Run key to start application
PID:3160 -
C:\Windows\SysWOW64\Systray.exeSystray.exe116⤵PID:4384
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe116⤵PID:4148
-
C:\Windows\SysWOW64\Systray.exeSystray.exe117⤵PID:4816
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe117⤵PID:5340
-
C:\Windows\SysWOW64\Systray.exeSystray.exe118⤵PID:6016
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe118⤵
- Drops file in System32 directory
PID:5440 -
C:\Windows\SysWOW64\Systray.exeSystray.exe119⤵PID:5472
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe119⤵PID:5560
-
C:\Windows\SysWOW64\Systray.exeSystray.exe120⤵PID:5676
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe120⤵
- Drops file in System32 directory
PID:5648 -
C:\Windows\SysWOW64\Systray.exeSystray.exe121⤵PID:5796
-
-
C:\Windows\SysWOW64\SysTrày.exeC:\Windows\system32\SysTrày.exe121⤵PID:5852
-
C:\Windows\SysWOW64\Systray.exeSystray.exe122⤵PID:5900
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-